University of Rochester Medical Center

All Other Users

Antivirus Strategy: Why it's important to be comprehensive

Viruses (and worms and Trojan horses and other "executable content") pose a threat not only to your computer's data, but also to other users and computers sharing files, receiving email, or running network services.

That's why it's important to not only install antivirus software, but also to make sure that this protection stay installed, appropriately configured, and always be up-to-date. By installing the antivirus software provided by University IT and ISD, these measures will be automatically taken care of for you, making less work for you as well as offering proper protection for your personal computer and the University's network.

Still unsure of the benefits of a comprehensive antivirus strategy? Compare options in the chart below.

A Comprehensive Antivirus Strategy includes:

A Comprehensive Antivirus Strategy is better than:

High volume licensing of desktop antivirus products which assures that all desktops are covered at the lowest possible cost.

Automatic updates of antivirus patterns sent directly to computers, which ensure that the software is installed correctly and is current. This also offers the ability to verify and assess the completeness of coverage.

Mail server coverage (It’s hard to ensure that 100% of desktops are covered and updated, so it’s best to prevent mail systems from becoming hosts of viruses which can be sent to other mail servers.)

Mail gateway coverage, at least in front of mail servers which have no native antivirus protection of their own.

Small volume or commercial purchases of desktop antivirus products are more expensive.

Small volume purchases result in de-synchronized subscription expirations which have costly renewal fees. Often times, computers no longer have subscription updates, but their owners don't realize it.

Independently-configured individual desktops also offer little assurance that the software is functioning correctly and no ability to assess the proper use of this software.

Coverage of some of the virus propagation methods but not all leaves systems open to an increasing number of viruses with multiple attack mechanisms.